Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-5087

Опубликовано: 21 нояб. 2019
Источник: debian
EPSS Низкий

Описание

An exploitable integer overflow vulnerability exists in the flattenIncrementally function in the xcf2png and xcf2pnm binaries of xcftools 1.0.7. An integer overflow can occur while calculating the row's allocation size, that could be exploited to corrupt memory and eventually execute arbitrary code. In order to trigger this vulnerability, a victim would need to open a specially crafted XCF file.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xcftoolsfixed1.0.7-6.1package
xcftoolsfixed1.0.7-6+deb10u1busterpackage

Примечания

  • https://github.com/j-jorge/xcftools/issues/13

  • https://talosintelligence.com/vulnerability_reports/TALOS-2019-0879

EPSS

Процентиль: 40%
0.00185
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 6 лет назад

An exploitable integer overflow vulnerability exists in the flattenIncrementally function in the xcf2png and xcf2pnm binaries of xcftools 1.0.7. An integer overflow can occur while calculating the row's allocation size, that could be exploited to corrupt memory and eventually execute arbitrary code. In order to trigger this vulnerability, a victim would need to open a specially crafted XCF file.

CVSS3: 8.8
nvd
около 6 лет назад

An exploitable integer overflow vulnerability exists in the flattenIncrementally function in the xcf2png and xcf2pnm binaries of xcftools 1.0.7. An integer overflow can occur while calculating the row's allocation size, that could be exploited to corrupt memory and eventually execute arbitrary code. In order to trigger this vulnerability, a victim would need to open a specially crafted XCF file.

CVSS3: 8.8
github
больше 3 лет назад

An exploitable integer overflow vulnerability exists in the flattenIncrementally function in the xcf2png and xcf2pnm binaries of xcftools 1.0.7. An integer overflow can occur while calculating the row's allocation size, that could be exploited to corrupt memory and eventually execute arbitrary code. In order to trigger this vulnerability, a victim would need to open a specially crafted XCF file.

EPSS

Процентиль: 40%
0.00185
Низкий